ops cert 1
Which of the following tools enables you to find out how much memory a particular application is using? A. Msconfig B. Task Manager C. Chkdsk D. System Information
B
Which protocol encrypts transactions through a website? A. HTTP B. SSL C. PuTTY D. Kerberos
B
Which type of software helps protect against viruses that are attached to e-mail? A. Firewall software B. Antivirus software C. Internet Explorer D. Hardware firewall
B
Which of the following features is used to both start and stop services? (Select the two best answers.) A. Computer Management B. Task Manager C. Performance Monitor D. MMC E. Msconfig
A,B
A co-worker just installed a second hard drive in his Windows computer. However, he does not see the drive in Explorer. What did he forget to do? (Select the three best answers.) A. Format the drive B. Partition the drive C. Run FDISK D. Initialize the drive E. Set up the drive in the BIOS/UEFI
A,B,D
Which of the following tasks can be performed to secure your WAP/router? (Select all that apply.) A. Changing the default SSID name B. Turning off SSID broadcasting C. Enabling DHCP D. Disabling DHCP
A,B,D
Which of the following is the most secure for your wireless network? A. WEP B. WPA2 C. TKIP D. WPA
B
Which of the following statements best describes a Windows service pack? A. Windows service packs are a new version of the operating system. B. Windows service packs are Resource Kit utilities. C. Windows service packs are compilations of software updates and patches. D. Windows service packs are driver updates.
C
Which of the following offers hardware authentication? A. NTFS B. Smart card C. Strong passwords D. Encrypted passwords
B
What is Windows recovery environment known as? (Select the two best answers.) A. WinRE B. Recovery Console C. Advanced Boot Options D. System Recovery Options
A,D
Which of the following terms refers to when people are manipulated into giving access to network resources? A. Hacking B. Social engineering C. Phishing D. Cracking
B
Which of the following tools enables you to create a partition in Windows? A. Disk Administrator B. Disk Management C. Computer Management D. Disk Cleanup
B
A customer's computer is using FAT32. Which file system can you upgrade it to when using the convert command? A. NTFS B. ext4 C. exFAT D. NFS
A
A fingerprint reader is known as which type of security technology? A. Biometrics B. Smart card C. Barcode reader D. SSID
A
Which interface is used to launch the ipconfig command? A. Command Prompt B. Control Panel C. MMC D. Task Manager
A
Which of the following files is the boot loader in Windows? A. Winload.exe B. BCD C. Setup.exe D. Ntoskrnl.exe
A
Which of the following is an example of social engineering? A. Asking for a username and password over the phone B. Using someone else's unsecured wireless network C. Hacking into a router D. A virus
A
Which type of partition should an operating system be installed to? A. Primary B. Extended C. Volume D. Logical drive
A
You are required to set up a secure connection between two offices over the Internet. Which technology should be used? A. VPN B. FTP C. VLAN D. HTTP
A
Which of the following Windows editions does not include Aero? (Select the two best answers.) A. Windows 7 Starter B. Windows 7 Ultimate C. Windows 8.1 Pro D. Windows Vista Business E. Windows Vista Home
A,C
Which of the following are Microsoft operating systems? (Select all correct answers.) A. Windows 8.1 B. iOS C. Vista D. Android E. Linux F. Windows 7
A,C,F
When you connect to a website to make a purchase by credit card, you want to make sure the website is secure. Which of the following statements best describes how to determine whether a site is secure? (Select the two best answers.) A. You should look for the padlock (in the locked position) toward the top or bottom of the screen. B. You should look for the padlock (in the unlocked position) toward the top or bottom of the screen. C. You should look for the protocol HTTP in the address or URL bar. D. You should look for the protocol HTTPS in the address or URL bar.
A,D
Where is the Windows Update feature located in Windows 7? A. Start > All Programs > Accessories B. Start > All Programs C. Start > All Programs > Control Panel D. Start > All Programs > Administrative Tools
B
Which shortcut key combination immediately locks Windows? A. Ctrl+Alt+Del B. Windows+R C. Windows+M D. Windows+L
D
Which type of malicious software creates multiple pop-ups on a computer? A. Grayware B. Spyware C. Worms D. Adware
D
Which component of Windows enables users to perform common tasks as non-administrators and, when necessary, as administrators without having to switch users, log off, or use Run As? A. USMT B. UAC C. USB D. VNC
B
Which log file contains information about Windows setup errors? A. setupact.log B. setuperr.log C. unattend.xml D. setuplog.txt
B
Which of the following commands creates a new directory in the Windows Command Prompt? A. CD B. MD C. RD D. SD
B
Which of the following is a common local security policy? A. Use of RAID B. Password length C. Router passwords D. Use of a password to log in
B
A customer's Windows computer needs a new larger, faster hard drive. Another technician in your company installs the new drive and then formats the old drive before delivering it to you for disposal. How secure is the customer's data? A. Completely insecure B. Very insecure C. Secure D. Completely secured
B
Of the following, which is not a method of installing Windows 7 or higher? A. Over the network B. CD-ROM C. DVD-ROM D. USB flash drive E. Image
B
Which of the following can be used to keep hard drives free of errors and ensure that Windows runs efficiently? (Select the two best answers.) A. Disk Management B. Disk Defragmenter C. Check Disk D. System Restore E. Task Scheduler
B,C
Which of the following commands is entered at the Command Prompt to learn more about the dir command? (Select the two best answers.) A. dir help B. help dir C. dir /? D. dir ?
B,C
A customer's Device Manager shows an arrow pointing down over one of the devices. What does this tell you? A. The device's driver has not been installed. B. The device is not recognized. C. The device is disabled. D. The device is in queue to be deleted.
C
To create a restore point in Windows, what must perform which of the following tasks? A. Run Disk Defragmenter from the MMC. B. Run Backup and Restore from the Control Panel. C. Run the System Restore program from System Properties. D. Run the Disk Cleanup program from System Properties.
C
Where are software-based firewalls commonly implemented? A. On routers B. On servers C. On clients D. On switches
C
Where is the Notification Area located in Windows? A. In the System Properties dialog box B. In the System32 folder C. On the taskbar D. Within the Start menu
C
Which of the following is the default file system used by Windows? A. FAT32 B. CDFS C. NTFS D. FAT
C
Which of the following is the minimum amount of RAM needed to install Windows Vista? A. 128 MB B. 256 MB C. 512 MB D. 1 GB
C
Which of the following is the most secure file system in Windows? A. ext4 B. exFAT C. NTFS D. FAT32
C
Which of the following switches (options) copy all files, directories, and subdirectories, including empty subdirectories in the TEST folder? A. xcopy . c:\test /T /S B. xcopy . c:\test /S C. xcopy . c:\test /E D. xcopy . c:\test /S /T
C
Which of the following tasks can not be performed from the Printer Properties screen? A. Modifying spool settings B. Adding ports C. Pausing printing D. Enabling sharing
C
Which of the following user account permissions are needed to install device drivers on Windows? A. Standard user B. Guest C. Administrator D. Power users
C
You are setting up auditing on a Windows computer. If it's set up properly, which of the following logs should contain entries? A. Application log B. System log C. Security log D. Maintenance log
C
Which type of virus propagates itself by tunneling through the Internet and networks? A. Macro B. Phishing C. Trojan D. Worm
D
Which of the following is the minimum amount of RAM needed to install Windows 7 or 8? (Select the two best answers.) A. 256 MB B. 512 MB C. 1 GB D. 2 GB
C,D
In Windows, an MMC is blank by default. Which of the following should be added to the MMC to populate it with programs? A. Applets B. Files C. Directories D. Snap-ins
D
Making data appear as if it is coming from somewhere other than its original source is known as which of the following terms? A. Hacking B. Phishing C. Cracking D. Spoofing
D
Which of the following is the most secure password? A. marquisdesod B. Marqu1sDeS0d C. MarquisDeSod D. Marqu1s_DeS0d
D
Which of the following represents the RAM limitation of Windows 8 Pro? A. 32 GB B. 64 GB C. 192 GB D. 512 GB
D